ONF Atrium Release 15A: An Open Source SDN Distribution Based Router
The Open Networking Foundation (ONF), a non-profit organization dedicated to accelerating the adoption of open Software-Defined Networking (SDN), has released Atrium, an open SDN software distribution designed to help the networking industry as a whole more easily adopt open SDN by fostering an open ecosystem of interoperable applications, controllers, and hardware-based OpenFlow switches. This webinar will examine the needs that drove the creation of Project Atrium, its objectives, elements, how it works and how it will evolve as SDN becomes more broadly deployed in brownfield networks.
RecordedJul 21 201559 mins
Your place is confirmed, we'll send you email reminders
Joe Dain, IBM; Andy Longworth, HPE; Chip Maurer, Dell Technologies
This talk will focus on the history of “Big Data” and how it has pushed the storage envelope, eventually resulting in a seemingly perfect relationship with Cloud Storage. But local storage is the 3rd wheel in this relationship, and won’t go down easy. Can this marriage survive when Big Data is being pulled in two directions? Should Big Data pick one, or can the three of them live happily ever after? This webcast will cover:
• The impact of edge computing
• The erosion of the data center
• Managing data-on-the-fly
• Grid management
• Next-gen Hadoop and related technologies
• Supporting AI workloads
• Data gravity and distributed data
AJ Casamento, Broadcom; Ed Mazurek, Cisco; John Kim, NVIDIA
Each SAN transport has its own way to initialize and transfer data. So how do initiators (hosts) and targets (storage arrays) communicate in Fibre Channel (FC) Storage Area Networks (SANs)?
Find out in this live webcast where Fibre Channel experts will answer:
• How do FC links activate?
• Is FC routable?
• What kind of flow control is present in FC?
• How do initiators find targets and set up their communication?
• Finally, how does actual data get transferred since that is the ultimate goal?
This session will introduce these concepts to demystify the FC SAN for the network professional.
Patty Driever, IBM; Dave Peterson, Broadcom; Craig Carlson, Marvell; David Rodgers, Teledyne LeCroy
Fibre Channel (FC) is the storage networking protocol for enterprise data centers with over 142 million ports having been shipped. Fibre Channel is purpose built and engineered to meet the demands for enterprise data centers that require rock solid reliability, high performance, and scalability. In other words, Fibre Channel technology transports FC-SB-x, FCP, and FC-NVMe storage protocols natively.
This webcast explains how Fibre Channel is architected for unparalleled performance for storage protocols. If you are interested in this architecture, please join us to learn more on the Fibre Channel:
• Functional levels and components
• Physical model
• Communication models
• Interconnect topologies
• Classes of service
• General Fabric model
• Generic Services
This all leads to a future webcast where we’ll dive into:
• Building blocks and their hierarchy
o Frames, Sequences, Exchanges, Protocols
• Segmentation and reassembly
• Error detection and recovery
• Current enhancements e.g., Congestion Notifications
Michael McManus, Intel; Christopher Davidson, HPE; Torben Kling Petersen, HPE; Alex McDonald, SNIA CSTI Chair
The use of genomics in modern biology has revolutionized the speed of innovation for the discovery of medicines. The COVID pandemic response has quickened genetic research and driven the rapid development of vaccines. Genomics, however, requires a significant amount of compute and data storage to aid discovery. This session is for IT professionals who are faced with delivering and supporting IT solutions for the required compute and data storage for genomics workflows. It will feature viewpoints from both the bioinformatics and technology perspectives with a focus on some of these compute and data storage challenges.
We will discuss:
• How to best store and manage these large genomics datasets
• Methods for sharing these large datasets for collaborative analysis.
• Legal and ethical implications of storing shareable data in the cloud
• Transferring large data sets and the impact on storage and networking
After you watch the presentation, check out the Q&A blog: https://bit.ly/SNIAGenomicQA
Erin Farr, IBM; Vincent Hsu, IBM; Jim Fister, The Decision Place
Data gravity has pulled computing to the Edge and enabled significant advances in hybrid cloud deployments. The ability to run analytics from the datacenter to the Edge, where the data is created and lives, also creates new use cases for nearly every industry and company. However, this movement of compute to the Edge is not the only pattern to have emerged. How might these other use cases impact your storage strategy?
This interactive webcast by the SNIA CSTI will focus on the following topics:
• Emerging patterns of data movement and the use cases that drive them
• Cloud Bursting
• Federated Learning across the Edge and Hybrid Cloud
• Considerations for distributed cloud storage architectures to match these emerging patterns
Steve Van Lare, Anjuna; Anand Kashyap, Fortanix; Michael Hoard Intel
To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today.
This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss:
· What would it take to build-your-own Confidential Computing solution?
· Emergence of easily deployable, cost-effective Confidential Computing solutions
· Real world usage examples and key technical, business and investment insights
After you watch the webcast, check out the Q&A blog at https://bit.ly/3DqFKj6
Moderator: Tim Lustig, NVIDIA; Panelists: Kfir Wolfson, Pliops and John F. Kim, NVIDIA
Thanks to big data, artificial intelligence (AI), the Internet of things (IoT), and 5G, demand for data storage continues to grow significantly. The rapid growth is causing storage and database-specific processing challenges within current storage architectures. New architectures, designed with millisecond latency, and high throughput, offer in-network and storage computational processing to offload and accelerate data-intensive workloads.
Join technology innovators as they highlight how to drive value and accelerate SSD storage through the specialized implementation of key value technology to remove inefficiencies through a Data Processing Unit for hardware acceleration of the storage stacks, and a hardware-enabled Storage Data Processor to accelerate compute-intensive functions.
By joining, you will learn why SSDs are a staple in modern storage architectures. These disaggegated systems use just a fraction of computational load and power while unlocking the full potential of networked flash storage.
Paul O’Neill, Intel; Parviz Peiravi, Intel; Glyn Bowden, HPE
As noted in our panel discussion “What is Confidential Computing and Why Should I Care?,” Confidential Computing is an emerging industry initiative focused on helping to secure data in use. The efforts can enable encrypted data to be processed in memory while lowering the risk of exposing it to the rest of the system, thereby reducing the potential for sensitive data to be exposed while providing a higher degree of control and transparency for users.
As computing moves to span multiple environments from on-premises to public cloud to edge, organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. In this live webcast we’ll cover:
• How Confidential Computing works in multi-tenant cloud environments
• How sensitive data can be isolated from other privileged portions of the stack
• Applications in financial services, healthcare industries, and broader enterprise applications
• Contributing to the Confidential Computing Consortium
John Kim, NVIDIA; Tom Friend, Illuminosi; Alex McDonald, Independent Consultant Vice Chair SNIA NSF
So much of what we discuss in SNIA is the latest emerging technologies in storage. While it’s good to know all about the coming technologies, it’s also important to understand those technologies being sunsetted. In this series, we cover obsolete hardware, protocols, interfaces and other aspects of storage
In our second installment of our Storage Technologies & Practices Ripe for Refresh, we will cover older HDD device interfaces and file systems. Advice will be given on how to replace these in production environments as well as why these changes are recommended. Also, we will be covering protocols that you should consider removing from your networks, either older versions of protocols where only newer versions should be used, or protocols that have been supplanted by superior options and should be discontinued entirely.
Finally, we will look at physical networking interfaces and cabling that are popular today but face an uncertain future as networking speeds grow ever faster.
Mike Bursell, Co-founder, Enarx Project; David Kaplan, AMD; Ronald Perez, Intel; Jim Fister, The Decision Place
In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast will provide an introduction and explanation of Confidential Computing and will feature a panel of industry architects responsible for defining Confidential Compute. It will be a lively conversation on topics including:
• The basics of hardware-based Trusted Execution Environments (TEEs) and how they work to enable confidential computing
• How to architect solutions based around TEEs
• How this foundation fits with other security technologies
• Adjacencies to storage technologies
Moderator: Jim Fister, SNIA CMSI; Panelists: Eli Tiomkin, Chair, SNIA CS SIG, Nidish Kamath, KIOXIA, David McIntyre, Samsung
In modern analytics deployments, latency is the fatal flaw that limits the efficacy of the overall system. Solutions move at the speed of decision, and microseconds could mean the difference between success and failure against competitive offerings. Artificial Intelligence, Machine Learning, and In-Memory Analytics solutions have significantly reduced latency, but the sheer volume of data and its potential broad distribution across the globe prevents a single analytics node from efficiently harvesting and processing data.This panel discussion will feature industry experts discussing the different approaches to distributed analytics in the network and storage nodes. How does the storage providers of HDDs and SSD view the data creation and movement between the edge compute and the cloud? And how can computational storage be a solution to reduce data movement?
Claudio DeSanti, Dell; Nishant Lodha, Marvell; Hrishikesh Sathawane, Samsung; Eric Hibbard, Samsung; John Kim, NVIDIA
With ever increasing threat vectors both inside and outside the data center, a compromised customer dataset can quickly result in a torrent of lost business data, eroded trust, significant penalties, and potential lawsuits. Vulnerabilities exist at every point when scaling out NVMe, which require data to be secured every time it leaves a server or the storage media, not only when leaving the data center. NVMe over Fabrics is poised to be the one of the most dominant transports of the future and securing and validating the vast amounts of data that would traverse this fabric is not just prudent, but paramount.
Join the webcast to hear Industry experts discuss current and future strategies to secure and protect your mission critical data.
You will learn:
- Industry trends and regulations around data security
- Potential threats and vulnerabilities
- Existing security mechanisms and best practices
- How to secure NVMe in flight and at rest
- Ecosystem and market dynamics
- Upcoming standards
After you watch the presentation, check out the Q&A blog https://bit.ly/2Wnrk1Y
Christine McMonigal, Intel; John Kim, NVIDIA; Walt O'Brien, Dell; David McIntyre, Samsung
In the ongoing evolution of the datacenter, a popular debate involves how storage is allocated and managed. There are three competing visions about how storage should be done; those are Hyperconverged Infrastructure (HCI), Disaggregated Storage, and Centralized Storage.
IT architects, storage vendors, and industry analysts argue constantly over which is the best approach and even the exact definition of each. Isn’t Hyperconverged constrained? Is Disaggregated designed only for large cloud service providers? Is Centralized storage only for legacy applications?
Tune in to debate these questions and more:
• What is the difference between centralized, hyperconverged, and disaggregated infrastructure, when it comes to storage?
• Where does the storage controller or storage intelligence live in each?
• How and where can the storage capacity and intelligence be distributed?
• What is the difference between distributing the compute or application and distributing the storage?
• What is the role of a JBOF or EBOF (Just a Bunch of Flash or Ethernet Bunch of Flash) in these storage models?
• What are the implications for data center, cloud, and edge?
Join us for another SNIA Networking Storage Forum Great Storage Debate as leading storage minds converge to argue the definitions and merits of where to put the storage and storage intelligence.
After you watch the debate, check out the Q&A blog: https://bit.ly/3kcAwA3
Parmeshwr Prasad, Dell; Olga Buchonina, Chair SNIA Blockchain Storage Technical Work Group, ActionSpot
The storage industry is working on ways to meet the demand for the very high throughput required for the volume of transactions per second in Blockchain operations.
There have been numerous advancements in Field Programmable Gate Array (FPGA) and Application Specific Integrated Circuit (ASIC) logics to improve the number of transactions per second for Blockchain operations. But these FPGA/ASIC improvements will not be sufficient for increasing the demand of hardware resources required for Blockchain. Smart network interface cards (NICs) offload low-level functions from server CPUs, dramatically increasing network and application performance, offloading all network related processing.
In this webcast, you will learn:
• The features of a Smart Network Interface Card (SMART-NIC) and how this will improve Blockchain transactions
• Why using SCM is ideal for in-memory databases
• Advantages of direct data movement without involving filesystems
• Benefits of using SCM to improve Blockchain transactions
Kiran Ranabhor, Cisco; Mark Jones, Broadcom; Rupin Mohan, HPE; Nishant Lodha, Marvell; Howard Johnson, Broadcom
Fibre Channel (FC) networks run on a highly streamlined protocol designed to offer persistently high performance. The FC protocol has built-in feedback mechanisms to avoid congestion and to alleviate it if it occurs. There are many new technologies being developed to monitor and manage performance and availability issues that may arise from time to time. Moreover, many of these tools are available across the ecosystem and are part of the FC standard.
Come listen to Fibre Channel technology experts to understand:
• New technologies like FPIN notification
• Exciting new innovations coming to the FC network
• How to ensure predictable performance
• QoS considerations
• Why FC is the best transport protocol for storage environments
Davis Frank, Co-creator Jasmine Test Framework; Alex McDonald, Chair, SNIA CSTI
In the world of cloud services development, it's necessary to gain an edge on the myriad of competition facing your product or service. Volume and variety are not just characteristics of cloud data, but also of the software needed to deliver accurate decisions. While a variety of software techniques exist to create effective development teams, sometimes it's worthwhile to look elsewhere for additional success factors. In this webcast, we'll be focusing on adapting some of the principles of modern manufacturing to add to the development toolbox. A Continuous Delivery methodology ensures that the product is streamlined in its feature set while building constant value to the customer via the cloud. Attendees will learn the following:
- Structuring development and testing resources for Continuous Delivery
- A flexible software planning cycle for driving new features throughout the process
- A set of simple guidelines for tracking success
- Ways to ensure new features are delivered before moving to the next plan
Ben Howard, KinectAir; Glyn Bowden, HPE; Jim Fister, The Decision Place
Start-up companies interested in using business analytics have a series of choices regarding different hardware, software, and services available in the cloud. The decision process for established companies, though, is more significant. Considering whether to use existing practices or start anew creates multiple decision points in any process. This SNIA webcast will feature views from both start-up and established companies on how to make the analytics decision. Attendees should expect to learn:
• Real-world examples of the analytics decision process
• How to use cloud resources in unique ways to accomplish business and engineering goals
• Starting from the perspective of business requirements and developing technical metrics
• Thoughts on when to start new vs. adapt existing analytics processes
After you watch the presentation, check out the Q&A blog: https://bit.ly/3u5pNtm
Erik Smith, Dell Technologies; Rob Davis, NVIDIA; Nishant Lodha, Marvell; Alex McDonald, SNIA NSF Vice Chair
Over the past several years, many in the NVMe over Fabrics (NVMe-oF) ecosystem have used test results demonstrating NVMe-oF’s dramatic reduction in latency as a way to extrapolate the benefit it can provide to application consumers. To date, the focus has been on specialized fabrics like RDMA and Fibre Channel (FC).
Unfortunately, the more important questions have been left as an exercise for the buyer: “How does the transport really impact application performance?” and “How does the transport holistically fit into my environment?”
RDMA based fabrics (e.g., RoCE) provide the lowest possible latency, and FC provides the most reliability, but with the introduction of NVMe/TCP this conversation must also include scale, cost and operations. This webcast will attempt to answer these questions beyond “it depends.”
Gain insights from an industry wide panel of NVMe and fabric technology experts as they discuss the thought process you can use to determine pros and cons of a fabric for your environment, including:
• Use cases driving fabric choices
• NVMe transports and their strengths
• Industry dynamics driving adoption
• Considerations for scale, security, and efficiency
After you watch the webcast, check out the Q&A blog at: bit.ly/3wRPeQV
Rob Enderle, Enderle Group; Eric Hibbard, SNIA Security Technical Work Group; Jim Fister, The Decision Place
Artificial Intelligence technologies are possibly the most substantive and meaningful change to modern business. The ability to process large amounts of data with varying degrees of structure and form enables large leaps in insight to drive revenue and profit. Likewise, governments and civil society have significant opportunity for improvement of the lives of the populace. However, with the power that AI brings comes the risks of any technology innovation. This interactive session will cover some of the ethical issues that AI can bring. Attendees should expect to learn:
• How making decisions at the speed of AI could be ethically challenging
• Examples of how companies have structures to approach AI policy
• The pitfalls of managing the human side of AI development
• Potential legal implications of using AI to make decisions
• Advice for addressing potential ethics issues before they are unsolvable
After you watch the webcast, check out the Q&A blog https://bit.ly/3vW5WOF
Scott Sinclair, Enterprise Strategy Group; Marcus Thordal, Broadcom; Craig Carlson, Marvell; Kiran Ranabhor, Cisco
Got Fibre Channel questions? Here’s your chance to get them answered. Coming together from multiple vendors and various technical disciplines, the Fibre Channel Industry Association (FCIA’s) depth of Fibre Channel expertise in unmatched.
On February 24, 2021, FCIA experts will share their knowledge by answering your Fibre Channel questions. Wondering which workloads are best suited for NVMe over Fibre Channel or why Fabric Services are important? Perhaps you have a specific question on performance, peer zoning or cabling & connectors. Ask away!
So, whether you’re a Fibre Channel novice or you’ve been working with it for 20 years, you likely have at least one question that could use some clarification. You may submit up to three questions for our panel. We’ll do our best to get to them all.
Submit your Fibre Channel questions here: http://bit.ly/AskFCIA
Updating the network infrastructure for the 21st century
With virtualization and cloud computing revolutionizing the data center, it's time that the network has its own revolution. Join the Network Infrastructure channel on all the hottest topics for network and storage professionals such as software-defined networking, WAN optimization and more to maintain performance and service in your infrastructure
ONF Atrium Release 15A: An Open Source SDN Distribution Based RouterMarc LeClerc, NoviFlow; Bithika Khargharia, Extreme Networks; Saurav Das, ONF[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]58 mins